1.MOBILE APPLICATION SECURITY
Authors : S.Danusree,D.Aldrine Douglas,N.Anurag
Paper Id :IJCRCST-JANUARY17-01
Page No : 1-3
2.MODELING AND DETECTION OF DISTRIBUTED CLONE ATTACKS FOR SAFETY TRANSACTIONS IN WSN
Authors : Suresh.H,Ravindra.S.Hegadi
Paper Id :IJCRCST-JANUARY17-02
Page No : 4-6
3.DIGITAL TWINS: A LEAD TO INDUSTRIAL REVOLUTION
Authors : R.Ame Rayan,A.Kaviya
Paper Id :IJCRCST-JANUARY17-03
Page No : 7-10
4.HAPTIC TECHNOLOGY: A TOUCH REVOLUTION
Authors : R.Waheetha,S.Jeya Revathi
Paper Id :IJCRCST-JANUARY17-04
Page No : 11-13
5.DEPLOYING ARTIFICIAL INTELLIGENCE TECHNIQUES IN SOFTWARE ENGINEERING
Authors : J.Maria Merceline Vijila,R.Abinaya
Paper Id :IJCRCST-JANUARY17-05
Page No : 14-17
6.INCREMENTAL HIGH UTILITY PATTERN TREES USING TRANSACTIONAL DATABASES
Authors : S.Dhivya,T.T.Mathangi,S.Jeniba
Paper Id :IJCRCST-JANUARY17-06
Page No : 18-24
7.A COMPREHENSIVE STUDY OF PRESERVING THE DATA PRIVACY IN ONLINE SOCIAL NETWORKS
Authors : G.Prathima
Paper Id :IJCRCST-JANUARY17-07
Page No : 25-28
8.TOWARDS THE CONTEMPORARY AND CONSISTENT ISOLATION SECURITY DESIGN IN UNIVERSAL INFORMATION BASED SYSTEM
Authors : Dr.G.Anandharaj,Dr.Srimanchari
Paper Id :IJCRCST-JANUARY17-08
Page No : 29-35
9.PROFITABLE RESOURCE ALLOCATION USING MAP REDUCE WITH CURA TECHNIQUES
Authors : Dr.S.Suriya,K.Nagalakshmi,G.Balakrishnan,S.J.Subhashini
Paper Id :IJCRCST-JANUARY17-09
Page No : 36-39
10.A STUDY ON LONG TERM EVOLUTION (LTE) TECHNOLOGY IN MOBILE COMPUTING
Authors : J.Saranya,R.Arun sanjay,R. Aishwarya
Paper Id :IJCRCST-JANUARY17-10
Page No : 40-42
11.A REVIEW OF FUZZY CLUSTERING ON BIG DATA
Authors : M.M.Kavitha,Dr. B.Anandhi
Paper Id :IJCRCST-JANUARY17-11
Page No : 43-47
12.A REVIEW ON BIG DATA ANALYSIS AND K-MEANS CLUSTERING ALGORITHM USING PERFORMANCE OF GPU
Authors : K.M.Padmapriya,Dr. B.Anandhi
Paper Id :IJCRCST-JANUARY17-12
Page No : 48-51